Solved

Need to install Joomla on CentOS 7 running XAMPP.

Posted on 2015-01-09
3
354 Views
Last Modified: 2015-03-03
This is my fault, I brought up a new VM of CentOS 7. So I need to install Joomla all over again.

http://www.experts-exchange.com/OS/Linux/Q_28523446.html   <--- However I am unable to make the solution work again.

I am running the latest versions of CentOS 7 and Xampp.
I have downloaded the latest versions of the Joomla Linux Module installer (and the full Joomla Linux installer).

These 2 commands do nothing once executed:
chmod +x bitnami-joomla-3.3.6-0-module-linux-installer.run
./bitnami-joomla-3.3.6-0-module-linux-installer.run

The only difference between my previous effort and my new one is: I used KDE desktop before, and now I am just using the default CentOS GUI now.

Need help!!! Thank you.
0
Comment
Question by:TheHappyTech
  • 2
3 Comments
 
LVL 62

Accepted Solution

by:
gheist earned 500 total points
ID: 40541444
You can add epel repository:
yum install epel-release
then install joomla using default web stack
yum search joomla

yum install ...
0
 

Author Comment

by:TheHappyTech
ID: 40541500
Thank you again Gheist very much appreciated.

I did "yum install epel-release" worked fine.

I am unsure how to install joomla using default web stack though.
Would you mind walking me through it?

HappyT
0
 
LVL 62

Assisted Solution

by:gheist
gheist earned 500 total points
ID: 40541536
https://docs.joomla.org/J3.x:Installing_Joomla

yum install php
yum install mariadb-server
yum install httpd
yum install php-mysql php-xml

1) version - check
2)  run at least mysql_secure_installation
3) v2.4
4)  zlib is included in php core

now unzip or git-clone joomla somewhere under /var/www and make a site description in a new file in /etc/httpd/conf.d

Follow the rest of the guide - create DB, connect it etc.

EPEL was not needed so far.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
windows 7 starter missing password 21 89
how to configure linux OS using Ubuntu 7 58
Linux Real Time Memory on Distinct 24 Cycle 7 29
CentOS 7 Linux for HP DL380 G4 32Bits 7 45
If I have to fix slow responding website my first thoughts are server side optimizations: the database may not be optimized or caching is not enabled, or things like that. We often overlook another major part of our web application: the client. We o…
International Data Corporation (IDC) prognosticates that before the current the year gets over disbursing on IT framework products to be sent in cloud environs will be $37.1B.
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.
Use Wufoo, an online form creation tool, to make powerful forms. Learn how to selectively show certain fields based on user input using rules to gather relevant information and data from your forms. The rules feature provides you with an opportunity…

789 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question